This project contains the full exploits whose development is explained in my article "Kernel Exploitation with GDI Objects". All of the exploits found in this repository are PoCs, and should be treated as such.
The code contained in this repository should be used for educational purposes only.